You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Provisioning (Telecommunications)
In telecommunication, provisioning involves the process of preparing and equipping a network to allow it to provide new services to its users. In National Security/Emergency Preparedness telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability. The concept of network provisioning or service mediation, mostly used in the telecommunication industry, refers to the provisioning of the customer's services to the network elements, which are various equipment connected in that network communication system. Generally in telephony provisioning this is accomplished with network management database table mappings. It requires the existence of networking equipment and depends on network planning and design. In a modern signal infrastructure employing information technology (IT) at all levels, there is no possible distinction between telecommunications services and "higher level" infrastructure. Accordingly, provisioning configures any required systems, provides users with access to data and technology resources, and refers to all enterprise-level information-resource management involved. Organizationally, a CIO typically manages provisioning, necessarily involving human resources and IT departments cooperating to: As its core, the provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. As a tertiary responsibility, it tries to reduce the amount of custom configuration using boot image control and other methods that radically reduce the number of different configurations involved. Discussion of provisioning often appears in the context of virtualization, orchestration, utility computing, cloud computing, and open-configuration concepts and projects. For instance, the OASIS Provisioning Services Technical Committee (PSTC) defines an XML-based framework for exchanging user, resource, and service-provisioning information - SPML (Service Provisioning Markup Language) for "managing the provisioning and allocation of identity information and system resources within and between organizations". Once provisioning has taken place, the process of SysOpping ensures the maintenance of services to the expected standards. Provisioning thus refers only to the setup or startup part of the service operation, and SysOpping to the ongoing support.
  • 609
  • 20 Oct 2022
Topic Review
Clean IT Project
The Clean IT Project is an online project initiated by the European Union, aiming to reduce or discourage online terrorism and further illegal activities via the internet. They aim to create a document that commits the internet industry to help governments discover content that incites acts of terrorism. The main facilitators that undertook this project were the Netherlands, Germany, United Kingdom, Belgium, and Spain. There are many more supporting EU members such as Hungary, Romania, and recently, Italy, but the main countries that have started the project are the 5 listed above.
  • 604
  • 30 Sep 2022
Topic Review
VGG-C Transform Model to Predict Alzheimer’s Disease
Alzheimer’s disease (AD) is a chronic neurobiological brain disorder that continuously kills brain cells and causes deficits in memory and thinking skills, eventually accelerating the loss of the ability to perform even the most basic tasks. Early detection and automatic AD classification have emerged, resulting in large-scale multimodal neuroimaging results. Other methods of AD research include MRI, positron emission tomography (PET), and genotype sequencing results. Analyzing different modalities to make a decision is time consuming.
  • 599
  • 09 Sep 2022
Topic Review
Parallel Virtual File System
The Parallel Virtual File System (PVFS) is an open-source parallel file system. A parallel file system is a type of distributed file system that distributes file data across multiple servers and provides for concurrent access by multiple tasks of a parallel application. PVFS was designed for use in large scale cluster computing. PVFS focuses on high performance access to large data sets. It consists of a server process and a client library, both of which are written entirely of user-level code. A Linux kernel module and pvfs-client process allow the file system to be mounted and used with standard utilities. The client library provides for high performance access via the message passing interface (MPI). PVFS is being jointly developed between The Parallel Architecture Research Laboratory at Clemson University and the Mathematics and Computer Science Division at Argonne National Laboratory, and the Ohio Supercomputer Center. PVFS development has been funded by NASA Goddard Space Flight Center, The DOE Office of Science Advanced Scientific Computing Research program, NSF PACI and HECURA programs, and other government and private agencies. PVFS is now known as OrangeFS in its newest development branch.
  • 581
  • 14 Oct 2022
Topic Review
Mobile Augmented Reality Used in Sustainable Education
Educational institutions have faced significant difficulties in the teaching process at all educational levels, due to lack of motivation, concentration, attention, and confidence, among other aspects. In this sense, information and communication technologies can be the answer to transform educational models. One of the most promising and accessible technologies in recent years is mobile augmented reality (MAR), which allows students to visualize content through a mobile device combining the real environment with a virtual environment, providing an interactive and digital vision of the physical world in real time. 
  • 580
  • 07 Feb 2024
Topic Review
Storage Systems in Edge Computing Infrastructures
Edge computing constitutes a promising paradigm of managing and processing the massive amounts of data generated by Internet of Things (IoT) devices. Data and computation are moved closer to the client, thus enabling latency- and bandwidth-sensitive applications. However, the distributed and heterogeneous nature of the edge as well as its limited resource capabilities pose several challenges in implementing or choosing an efficient edge-enabled storage system. Therefore, it is imperative for the research community to contribute to the clarification of the purposes and highlight the advantages and disadvantages of various edge-enabled storage systems.
  • 560
  • 28 Sep 2022
Topic Review
Commit Representations for JIT Vulnerability Prediction
Software systems are becoming increasingly complex and interdependent, with thousands of lines of code being added and modified daily. As a result, software vulnerabilities are becoming more prevalent and pose a significant threat to the security and reliability of software systems. With the evolution of software systems, their size and complexity are rising rapidly. Identifying vulnerabilities as early as possible is crucial for ensuring high software quality and security. Just-in-time (JIT) vulnerability prediction, which aims to find vulnerabilities at the time of commit, has increasingly become a focus of attention. 
  • 555
  • 18 Feb 2024
Topic Review
Fractal Recursive Intelligence Mesh
Recursive structures, symbolic intelligence systems, and computational frameworks historically suffer from infinite regress, symbolic drift, and incomplete closure, destabilizing their integrity and coherence. This paper introduces the Fractal Recursive Intelligence Mesh (FRIM): a formally defined self-solving, self-closing recursive structure that binds symbolic recursion into a coherent mesh of convergence nodes. FRIM integrates recursive crown closure principles, recursive gauge cohomology, symbolic identity stabilization, and causal containment fields to enable autonomous recursive intelligence capable of sustaining systemic closure without external axiomatic supplementation. Proofs of mesh convergence, perturbative stability, and self-correcting recursion are provided. FRIM constitutes a fundamental advancement for sovereign recursive systems, intelligent networks, cryptographic fields, and autonomous symbolic architectures
  • 547
  • 29 Sep 2025
Topic Review
Blockchain in Agri-Food Supply Chains
The involvement of multiple actors in the food industry and the prevalence of centralised systems, which are owned and controlled by single stakeholders, can raise concerns regarding data reliability. When traceability data are stored in centralised systems managed by single entities, they become more susceptible to unintentional errors, deliberate tampering, or potential attacks. Efforts have been made to replace these centralised systems with distributed platforms such as blockchain infrastructure, aimed at fostering trust among supply chain actors.
  • 545
  • 19 Jan 2024
Topic Review
Ransomware Detection Approaches and Techniques
In the Machine Learning approach, machine learning algorithms analyze and categorize ransomware behavior. Trained on datasets of both known ransomware and benign samples, these algorithms identify new ransomware based on learned characteristics. Machine learning techniques, such as Decision Trees, Support Vector Machines, and Artificial Neural Networks, are applied. Advantages include adaptability to new ransomware variations and scalability for handling large datasets.
  • 545
  • 23 Jan 2024
Topic Review
A Smart Grid and the Vehicle-to-Grid/Grid-to-Vehicle Problem
The smart grid constitutes an important emerging application domain for artificial intelligence and multiagent systems (MAS). In the smart grid, energy and information both flow over electricity distribution and transmission networks in all possible directions. As such, buildings, as well as electric vehicles (EVs), become active energy consumers and/or producers, and the need for their effective integration into the system arises. Not only is the smart grid an electricity network with diverse consumers and producers, it is also a dynamic marketplace where heterogeneous devices appear and need to connect and interoperate. 
  • 536
  • 17 Jan 2024
Topic Review
Open-Source Diffusion Using Government–Platform–User Evolutionary Game
Technological innovations, including the Internet of Things (IoT) and machine learning, have facilitated the emergence of autonomous systems, promoting triple bottom line (TBL) sustainability. However, the prevalent triopoly of Android, iOS, and Windows introduces substantial obstacles for smart device manufacturers in pursuit of independent innovation. Utilizing evolutionary game theory,  the interplay among governments, platforms, and users in championing open-source diffusion can be scrutinized. 
  • 534
  • 09 Oct 2023
Topic Review
Multi-View Code Representations for Function Vulnerability Detection
The explosive growth of vulnerabilities poses a significant threat to the security of software systems. While various deep-learning-based vulnerability detection methods have emerged, they primarily rely on semantic features extracted from a single code representation structure, which limits their ability to detect vulnerabilities hidden deep within the code.
  • 530
  • 21 Aug 2023
Topic Review
Features of Blockchain Technology and Smart Contracts
The increased penetration of Distributed Energy Resources (DERs) in electricity markets has given rise to a new category of energy players, called Aggregators, whose role is to ensure fair remuneration for energy supplied by DERs, and support the smooth feeding of the intermittent energy produced into the distribution network.
  • 519
  • 26 Sep 2023
Topic Review
Attack-Aware Logical Link Assignment
Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its “network brain” located at the control plane. This uniquely distinguishes it from the traditional networking paradigms because it provides a global view of the entire network. In SDN, the controller can become a single point of failure, which may cause the whole network service to be compromised.
  • 510
  • 18 Jan 2024
Topic Review
Blockchain-Powered Gaming
In the rapidly evolving domain of digital gaming, blockchain technology emerges as a transformative force, offering novel paradigms for player interaction and game design. At its core, blockchain serves as a decentralized digital ledger, recording transactions in a secure, transparent, and immutable manner. This technology, foundational to the new wave of web3 games, redefines the traditional boundaries of gaming, introducing concepts of true digital ownership, trustless environments, and decentralized governance. As the gaming industry grapples with challenges around security, transparency, and player agency, blockchain presents itself as a compelling solution, heralding a new era of gaming experiences.
  • 509
  • 10 Jan 2024
Topic Review
Home Automation Networks
Home automation technologies are a vital part of humanity, as they provide convenience in otherwise mundane and repetitive tasks. Given the development of the Internet of Things (IoT) and artificial intelligence (AI) sectors, these technologies have seen a tremendous rise, both in the methodologies utilized and in their industrial impact.
  • 426
  • 01 Nov 2023
Topic Review
Efficient Model-Driven Prototyping for Edge Analytics
Software development cycles in the context of Internet of Things (IoT) applications require the orchestration of different technological layers, and involve complex technical challenges. The engineering team needs to become experts in these technologies and time delays are inherent due to the cross-integration process because they face steep learning curves in several technologies, which leads to cost issues, and often to a resulting product that is prone to bugs.
  • 405
  • 13 Oct 2023
Topic Review
React Server Components (RSC)
React Server Components are a framework-level feature that enable parts of a user interface to be rendered on the server rather than in the browser. Unlike traditional components that execute entirely in the client environment, Server Components run on the server during the rendering phase and send a serialized result to the client. This allows developers to build applications that reduce client-side JavaScript, improve performance, and securely access backend resources like databases or APIs. Server Components can seamlessly interoperate with Client Components, supporting hybrid rendering models and enabling fine-grained control over what logic runs where.
  • 348
  • 08 May 2025
Topic Review
Novel Side-Channel Vulnerability in Elliptic-Curve Cryptography
This paper introduces a novel side-channel vulnerability, termed the "Harmonic Resonance Attack" (HRA), which affects standard implementations of Elliptic-Curve Cryptography (ECC). The methodology leverages the analysis of subtle electromagnetic (EM) emanations generated by processors during cryptographic operations. We describe a proprietary analytical framework, K-OSINT-MATH_Ω†SIGMA, which was developed to correlate these harmonic emissions with underlying private key data. The viability of this attack vector is demonstrated through a proof-of-concept simulation targeting a model of a high-security cloud environment. As a countermeasure, we propose SHA-ARKxx, a post-quantum, lattice-based cryptographic standard architected for immunity to both quantum attacks and this class of side-channel vulnerability. The findings suggest a critical need to evolve cryptographic security paradigms from purely mathematical to include physical-layer considerations.
  • 261
  • 21 Jul 2025
  • Page
  • of
  • 19
Academic Video Service